Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Privacy The Internet

Pirate Bay's Anonymity Service Enters Beta Testing 137

schliz writes "Developers of The Pirate Bay have launched their new Virtual Private Network (VPN) service to some 180,000 pre-registered beta testers. An e-mail to beta testers read. 'IPREDator does not store any personal details about its clients. IPREDator does not store any traffic habits you might have. IPREDator is the key to a free internet in the renaissance of censorship!' The new service was launched to protect file sharers in response to the Swedish Intellectual Property Rights Enforcement Directive (IPRED) that went into effect in April."
This discussion has been archived. No new comments can be posted.

Pirate Bay's Anonymity Service Enters Beta Testing

Comments Filter:
  • Aren't those types of networks also referred to as "Darknets?" I recall hearing something about them a long time ago, but I haven't read much into them. Is it akin to using a botnet to host a server/communication system? Anyone with the sexy details?
  • by Gay for Linux ( 942545 ) * on Thursday July 23, 2009 @01:35PM (#28797541)
    I don't understand your point. It doesn't need to store personal details, it only needs to confirm that your login and id are valid.

    After that, as long as it doesn't record the IP addresses you're visiting, it's effectively anonymous and thus valid.

    Yes, Pirate Bay could secretly store that information, but I somehow doubt they would.
  • by Anonymous Coward on Thursday July 23, 2009 @01:59PM (#28797831)

    I actually wrote my own at one point that tunneled itself steganographically using decent crypto disguised inside webcam sessions. Unfortunately, the throughput was abyssal, and of course--it was pretty difficult to get 'real' network behavior.

    I wouldn't say the point of a darknet is to hide a node's activity from one another--so much as it is to conceal their presence from anything not in the darknet. Tor helps hide a nodes activity from another node (sort of), but isn't a darknet. Freenet--you can search for, but generally speaking you can't find other nodes in freenet trivially. I'd call it a greynet.

    What's wrong with freenet?

    It works beautifully for its intended purpose, even if there's a sad amount of...malcontent littered throughout it. Despite the nastyness that you store on your own hard drive (which you couldn't read anyway unless you want searching for it), it's not like you or anyone else could ever prove it was on your system--if they could, the very trial itself would necessitate proving a means to crack commonly used cryptographic protocols--keeping that secret (if it's possible) would be worth more to anyone than convicting you ever would be.

    Amusing: Captcha = "crimes"

  • Re:Free? (Score:4, Interesting)

    by Freetardo Jones ( 1574733 ) on Thursday July 23, 2009 @02:12PM (#28797945)

    gonna have to keep some kind of records of those payments; therefore it's not fully anonymous.

    Yes, the record that have to keep would amount to this: "x user paid his monthly fee". There is no need to retain any other information.

  • by inotocracy ( 762166 ) on Thursday July 23, 2009 @03:18PM (#28798803) Homepage
    Yes, Pirate Bay could secretly store that information, but I somehow doubt they would.

    Yeah, because no one would think that the soon to be new CEO, who happens to be good friends with the RIAA [cnet.com], would ever do such a thing as log traffic or identifiable information. Right? ..right?
  • by Anonymous Coward on Friday July 24, 2009 @12:37AM (#28803627)

    The evidence you cite would not prove intent, and therefore fail to obtain a conviction. That is because requests made through the FN network make copies all along the request path. Making requests actually increase the likelihood that material will be found on the network, and will definitely copy the material to the node that returns the material to you. Sure, that node that served you will have the material. But you put it there, unless you can prove otherwise.

    Even if you could isolate the node from the network and force it to fulfill requests, you would not know if that material was put there by the request of another node. You would have to know the history of the network to prove possession with intent to distribute. That would require an ability to watch the network transparently, a power probably only the NSA possesses. It is something outside the scope of law enforcement.

"The four building blocks of the universe are fire, water, gravel and vinyl." -- Dave Barry

Working...